8.11.1 Vulnerabilities
While "security through obscurity" may have provided sufficient protection in the
past, Campbell Scientific dataloggers increasingly are deployed in sensitive
applications. Devising measures to counter malicious attacks, or innocent
tinkering, requires an understanding of where systems can be compromised and
how to counter the potential threat.
Note Older CR1000 operating systems are more vulnerable to attack than recent
updates. Updates can be obtained free of charge at www.campbellsci.com.
The following bullet points outline vulnerabilities:
• CR1000KD Keyboard Display
o Pressing and holding the Del key while powering up a CR1000 will
cause it to abort loading a program and provides a 120 second window to
begin changing or disabling security codes in the settings editor (not
Status table) with the keyboard display.
o Keyboard display security bypass does not allow telecommunication
access without first correcting the security code.
o Note These features are not operable in CR1000KDs with serial
numbers less than 1263. Contact Campbell Scientific for information on
upgrading the CR1000KD operating system.
• LoggerNet
o All datalogger functions and data are easily accessed via RS-232 and
Ethernet using Campbell Scientific datalogger support software.
o Cora command find-logger-security-code
• Telnet
o Watch IP traffic in detail. IP traffic can reveal potentially sensitive
information such as FTP login usernames and passwords, and server
connection details including IP addresses and port numbers.
o Watch serial traffic with other dataloggers and devices. A Modbus
capable power meter is an example.
o View data in the Public and Status tables.
o View the datalogger program, which may contain sensitive intellectual
property, security codes, usernames, passwords, connection information,
and detailed or revealing code comments.
• FTP
o Send and change datalogger programs.
o Send data that have been written to a file.
• HTTP
o Send datalogger programs.
o View table data.
o Get historical records or other files present on the datalogger drive
spaces.
o More access is given when a .csipasswd is in place, so ensure that users
with administrative rights have strong log-in credentials.
468